Essays about: "Permissions"

Showing result 1 - 5 of 57 essays containing the word Permissions.

  1. 1. Android Malware Detection Using Machine Learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Rahul Sai Kesani; [2024]
    Keywords : Malware; Machine Learning; Random Forest; Sequential Neural Network.;

    Abstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE

  2. 2. Reactor Chemistry in LWR SMRs : Determination of the rate constant for the reaction between boric acid and hydroxyl radicals

    University essay from KTH/Tillämpad fysikalisk kemi

    Author : Fredrik Petersson; [2023]
    Keywords : LWR; SMR; Water chemistry; Radiolysis; Boric acid; LWR; SMR; vattenkemi; Radiolys; Borsyra; Hydroxylradikal;

    Abstract : Ett problem vid byggandet av nya kärnkraftverk för elproduktion är de stora investeringskostnaderna samt den långa tiden det att få tillstånd för en reaktor och bygga den. Nyligen färdigställdes den tredje reaktorn vid Olkiluoto I Finland, den tog 18 år att färdigställa exklusive tiden att få tillstånd för reaktorn. READ MORE

  3. 3. Workflow-driven, dynamic authorization for Modular Automation systems

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Enna Basic; Ivan Radonjic; [2023]
    Keywords : industrial control systems; dynamic access control; authorization service; cyber security; modular automation;

    Abstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE

  4. 4. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Chanvuth Chea; [2023]
    Keywords : ;

    Abstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE

  5. 5. Implementing and Investigating Partial Consent for Privacy Management of Android

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Mohan Krishna Reddy Nallamilli; Satya Venkat Naidu Jagatha; [2022]
    Keywords : Partial consent; Access control; Data Privacy; Data Security; Usability Aspect;

    Abstract : Background: Data privacy and security has been a big concern in recent years. Data privacy is a concern for everybody who owns a smartphone or accesses a website. This is due to the applications that have been installed on the device or the cookies that have been acquired via websites in the form of advertising cookies. READ MORE